File name: | e9ff8049f8062d36c552dae5be74bc8150f2936a1654fae4bf88aa3e2c5278d3.doc |
Full analysis: | https://app.any.run/tasks/899d3163-3e32-4907-9d60-0d1229224514 |
Verdict: | Malicious activity |
Analysis date: | November 15, 2018, 06:36:21 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | text/rtf |
File info: | Rich Text Format data, version 1, unknown character set |
MD5: | 57F6FD3A70A1EB9413E0449D23EA1BA1 |
SHA1: | 39BCE12392ADA7E5482C97683E07AC1E2DBADD22 |
SHA256: | E9FF8049F8062D36C552DAE5BE74BC8150F2936A1654FAE4BF88AA3E2C5278D3 |
SSDEEP: | 12288:BUBFOZNq7jISZw1mkQUzwQFzOcfun1vaul2OVWqUSz6z0LXRxMUrAOW2YJ:OiEZyw2u1vnfYSz6gLB4OWJ |
.rtf | | | Rich Text Format (100) |
---|
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3272 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\e9ff8049f8062d36c552dae5be74bc8150f2936a1654fae4bf88aa3e2c5278d3.doc.rtf" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | explorer.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Exit code: 1 Version: 14.0.6024.1000 | ||||
2320 | "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding | C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE | svchost.exe | |
User: admin Company: Design Science, Inc. Integrity Level: MEDIUM Description: Microsoft Equation Editor Version: 00110900 | ||||
3072 | CmD CmD /c %tMP%\dqfm.cmd ! abDac | C:\Windows\system32\CmD.exe | — | EQNEDT32.EXE |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
820 | C:\Windows\system32\cmd.exe /K C:\Users\admin\AppData\Local\Temp\"hondi.cmd" | C:\Windows\system32\cmd.exe | — | CmD.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
1904 | TIMEOUT 1 | C:\Windows\system32\timeout.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: timeout - pauses command processing Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2328 | C:\Users\admin\AppData\Local\Temp\mondi.eXe | C:\Users\admin\AppData\Local\Temp\mondi.exe | cmd.exe | |
User: admin Integrity Level: MEDIUM | ||||
2548 | taskkill /F /IM winword.exe /T | C:\Windows\system32\taskkill.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Terminates Processes Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
(PID) Process: | (3272) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems |
Operation: | write | Name: | nhj |
Value: 6E686A00C80C0000010000000000000000000000 | |||
(PID) Process: | (3272) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
Operation: | write | Name: | 1033 |
Value: Off | |||
(PID) Process: | (3272) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
Operation: | write | Name: | 1033 |
Value: On | |||
(PID) Process: | (3272) WINWORD.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage |
Operation: | write | Name: | WORDFiles |
Value: 1299120143 | |||
(PID) Process: | (3272) WINWORD.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage |
Operation: | write | Name: | ProductFiles |
Value: 1299120256 | |||
(PID) Process: | (3272) WINWORD.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage |
Operation: | write | Name: | ProductFiles |
Value: 1299120257 | |||
(PID) Process: | (3272) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word |
Operation: | write | Name: | MTTT |
Value: C80C0000366EBA96AD7CD40100000000 | |||
(PID) Process: | (3272) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems |
Operation: | write | Name: | 3jj |
Value: 336A6A00C80C000004000000000000008C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074006D00000000000000 | |||
(PID) Process: | (3272) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems |
Operation: | delete value | Name: | 3jj |
Value: 336A6A00C80C000004000000000000008C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074006D00000000000000 | |||
(PID) Process: | (3272) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 0 |
PID | Process | Filename | Type | |
---|---|---|---|---|
3272 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVRA8CE.tmp.cvr | — | |
MD5:— | SHA256:— | |||
3272 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DCF767E.png | — | |
MD5:— | SHA256:— | |||
3272 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\trbatehtqevyay.ScT | xml | |
MD5:851AF9CA1CE1124AEE401B4544E5F73D | SHA256:89A08119818DD320507CFE73D30D344934A1693DF16208012470129A3C2BBE2F | |||
3272 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\mondi.exe | executable | |
MD5:54B3B277A6C794FDD62F26B9B0008D24 | SHA256:975CBE7831DBF3696F1B8B2D3212987FB71655181E831249701B83392DAAB32D | |||
2328 | mondi.exe | C:\Users\admin\AppData\Local\Temp\Subabbot | binary | |
MD5:D73C0CF2BA30B6F9D2CA466116E48A22 | SHA256:7304FA1B3C0CB29B09A3F5D5EF6BED354239FC4D3F3E2BB2349AFD99FC856CB7 | |||
3272 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$ff8049f8062d36c552dae5be74bc8150f2936a1654fae4bf88aa3e2c5278d3.doc.rtf | pgc | |
MD5:C393FAFBDBFEBF6627017572C93AF54E | SHA256:026C77077E4257E0DD3576E9D799E780179BD05E69394DD89C1683E9DBD8DB1C | |||
3272 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:256A3EF47ED32A3D3038855D49DF0319 | SHA256:151B56C71BC28DD4D752808CE3A9352E96D9FA381320511F87B327A8208F5DD0 | |||
3272 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\hondi.cmd | text | |
MD5:C3ABF5A881A043139956ADFA44E88259 | SHA256:49C02E342FB4F29606A74388F544BB9996A531E02C26E37900FBBEBFCE817156 | |||
3272 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\dqfm.cmd | text | |
MD5:24A0E12969C61D7FD4F947C3BEAC3FA0 | SHA256:6FD5C00260692D64082411A0CCFC260485D678F8AEC610E3DC51AEF5070CE5E8 | |||
3272 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\gondi.doc | text | |
MD5:B3129B6A95DB680CF911660AB17D7A13 | SHA256:56232B5BE28B819DC07AF5450612928F51FE29CFAA6BFE86A3DFDBFC3C5EE3B2 |
Domain | IP | Reputation |
---|---|---|
www.realmatchllc.com |
| unknown |
www.sdn2gurabati.net |
| unknown |